咨询与建议

限定检索结果

文献类型

  • 1,250 篇 会议
  • 519 篇 期刊文献

馆藏范围

  • 1,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,074 篇 工学
    • 760 篇 计算机科学与技术...
    • 629 篇 软件工程
    • 253 篇 信息与通信工程
    • 233 篇 电气工程
    • 142 篇 控制科学与工程
    • 128 篇 电子科学与技术(可...
    • 112 篇 生物工程
    • 94 篇 机械工程
    • 58 篇 光学工程
    • 56 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 49 篇 生物医学工程(可授...
    • 43 篇 交通运输工程
    • 40 篇 网络空间安全
    • 39 篇 材料科学与工程(可...
    • 35 篇 仪器科学与技术
    • 28 篇 建筑学
  • 493 篇 理学
    • 296 篇 数学
    • 122 篇 物理学
    • 120 篇 统计学(可授理学、...
    • 119 篇 生物学
    • 50 篇 化学
    • 26 篇 系统科学
  • 282 篇 管理学
    • 173 篇 管理科学与工程(可...
    • 132 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 63 篇 法学
    • 51 篇 社会学
  • 55 篇 医学
    • 47 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 18 篇 农学
  • 5 篇 教育学
  • 5 篇 军事学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 118 篇 feature extracti...
  • 85 篇 accuracy
  • 63 篇 semantics
  • 63 篇 training
  • 60 篇 computational mo...
  • 51 篇 data models
  • 50 篇 federated learni...
  • 43 篇 deep learning
  • 36 篇 neural networks
  • 30 篇 data mining
  • 30 篇 visualization
  • 29 篇 predictive model...
  • 27 篇 object detection
  • 26 篇 transformers
  • 26 篇 privacy
  • 25 篇 image segmentati...
  • 25 篇 robustness
  • 24 篇 security
  • 24 篇 network security
  • 24 篇 adaptation model...

机构

  • 223 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 193 篇 school of inform...
  • 125 篇 shandong provinc...
  • 82 篇 shandong provinc...
  • 58 篇 college of compu...
  • 50 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 shandong provinc...
  • 38 篇 fujian provincia...
  • 38 篇 state grid key l...
  • 35 篇 fujian key labor...
  • 34 篇 shandong provinc...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 27 篇 state grid key l...
  • 26 篇 fujian key labor...
  • 24 篇 quan cheng labor...

作者

  • 34 篇 feng zhiquan
  • 25 篇 chen yuehui
  • 24 篇 zhiquan feng
  • 23 篇 guo wenzhong
  • 21 篇 yang bo
  • 20 篇 xiaoming wu
  • 20 篇 guo kun
  • 18 篇 yang yang
  • 18 篇 zhang bo
  • 18 篇 xi zesheng
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 15 篇 niu sijie
  • 15 篇 wang gang
  • 14 篇 chen zhenxiang
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 zhenxiang chen
  • 13 篇 zhang jing
  • 13 篇 yang xiaohui

语言

  • 1,673 篇 英文
  • 58 篇 其他
  • 47 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information"
1769 条 记 录,以下是1-10 订阅
排序:
Multimodal Cross-Attention Mechanism-Based Algorithm for Elderly Behavior Monitoring and Recognition
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 309-321页
作者: Hao Liu Zhiquan Feng Qingbei Guo School of Information Science and Engineering Unicersity of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Unicersity of Jinan
In contrast to the general population, behavior recognition among the elderly poses increased specificity and difficulty, rendering the reliability and usability aspects of safety monitoring systems for the elderly mo... 详细信息
来源: 评论
Meta-path and Meta-schema Hierarchical Aggregation for Heterogeneous Graph Neural networks  10
Meta-path and Meta-schema Hierarchical Aggregation for Heter...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Wu, Ling Gao, Pingping Guo, Kun Fujian Key Laboratory of Network Computing and Intelligent Information Processing China
With deep learning's advancement in recent years, heterogeneous graph neural networks (HGNNs) have drawn a lot of interest. They are a group of deep learning models specifically designed for handling heterogeneous... 详细信息
来源: 评论
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering  6
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
6th International Conference on Frontier Technologies of information and Computer, ICFTIC 2024
作者: Qi, Mengshi Wang, Xin He, Yunpeng Yang, Ming Wu, Xiaoming Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive Learning Framework for Drug-Target Binding Affinity Prediction
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive L...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Li, Huiting Zhang, Weiyu Shang, Yong Lu, Wenpeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China
Drug-target binding affinity prediction is critical to drug design. Some existing computational methods rely on single-scale data and cannot fully integrate the rich information of multi-scale data, such as molecular ... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints  6
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
6th International Conference on Frontier Technologies of information and Computer, ICFTIC 2024
作者: Li, Duanzhen Xu, Shujiang He, Haochen Xue, Hongrui Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
A Lightweight Node Verification and Protection Strategy for Edge computing  5
A Lightweight Node Verification and Protection Strategy for ...
收藏 引用
5th International Seminar on Artificial Intelligence, networking and information Technology, AINIT 2024
作者: Du, Jiayuan Zhang, Guowei Qufu Normal University School of Cyber Science and Engineering Qufu China Key Laboratory of Computing Power Network and Information Security Jinan China
To alleviate the burden on the core network, edge computing has rapidly advanced to support distributed computing. However, as sensitive information is delegated to the edge layer closer to endpoints, the privacy prot... 详细信息
来源: 评论
Offloading Mode Hidden for Delay Sensitive Tasks in Edge computing networks  5
Offloading Mode Hidden for Delay Sensitive Tasks in Edge Com...
收藏 引用
5th International Seminar on Artificial Intelligence, networking and information Technology, AINIT 2024
作者: Zhang, Guowei Du, Jiayuan Qufu Normal University School of Cyber Science and Engineering Qufu China Key Laboratory of Computing Power Network and Information Security Jinan China
Edge computing has been developed to support local services with lower burden to the core network. However, privacy issues deteriorate when terminal users enjoy the high-quality services with the price of sending thei... 详细信息
来源: 评论
An Adaptive Residual Coordinate Attention-Based network for Hat and Mask Wearing Detection in Kitchen Environments
An Adaptive Residual Coordinate Attention-Based Network for ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Ying Wu, Xiaoming Liu, Xiangzhi Chen, Hao Qi, Bei Dong, Huomin Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In order to ensure food safety, it is required for personnel to wear hats and masks during food handling processes. To accurately detect the wearing status of kitchen staff, the ARP-YOLO model is proposed. Firstly, im... 详细信息
来源: 评论
DP-DID: A Dynamic and Proactive Decentralized Identity System
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 4999-5014页
作者: Yin, Jie Xiao, Yang Chen, Qian Lim, Yong zhi Liu, Xuefeng Pei, Qingqi Zhou, Jianying Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Singapore University of Technology and Design Department of Information Systems Technology and Design Tampines 487372 Singapore Xidian University State Key Laboratory of Integrated Services Network Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China
Decentralized identity (DID) is a transformative paradigm that leverages blockchain, decentralized identifiers and verifiable credentials (VCs) to enable self-sovereign and decentralized identity management with myria... 详细信息
来源: 评论